Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
Security to Outsource Data in Community Cloud with the Trusted Tenant System
Kundan Kunal, Dr. Latesh Malik
Cloud Computing is the dreamed vision of next-generation IT infrastructure. In cloud architecture community cloud shared among several user or organization for the common purpose. In cloud environment application and data placed to centralized data centres through which user can enjoy service like on demand, location independent and relieve from burden of storage and maintenance of data and reduced hardware soft ware cost. Placing the critical data in the hands of a cloud provider that fact that users no longer have possession to outsource data so cloud environment should guarantee of security of data to the user and fully trustworthy to use. Security of outsource data is very challenging task in cloud environment. We propose tenant system that provides the security to community cloud that guarantee security of data stored in server or motion in channel. In this paper two different encryption methods RC6 and SHA1 is used to provide the security to cloud data and the database. This architecture used OAuth technique for the user authentication to access the system and for the secure sharing of data to different user with in the cloud TTLS (Tunnel transport layer security) technique is used for secured sharing. The results of this system provide highly secured environment for data to place in cloud server and result ensure about the security of outsource data with different techniques at different level.
Keywords: Cloud computing, Security, RC6, OAuth SHA1, TTLS
Edition: Volume 4 Issue 4, April 2015
Pages: 2703 - 2708
How to Cite this Article?
Kundan Kunal, Dr. Latesh Malik, "Security to Outsource Data in Community Cloud with the Trusted Tenant System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153785, Volume 4 Issue 4, April 2015, 2703 - 2708
93 PDF Views | 85 PDF Downloads
Similar Articles with Keyword 'Cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'Security'
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Similar Articles with Keyword 'RC6'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 733 - 736Review of a New Distinguishing Attack Using Block Cipher with a Neural Network
Vina M. Lomte, Archana D. Shinde
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3253 - 3257BIST Based Secure Data Aggregation in Wireless Sensor Network
Rakesh Kumar Ranjan, S. P. Karmore
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2703 - 2708Security to Outsource Data in Community Cloud with the Trusted Tenant System
Kundan Kunal, Dr. Latesh Malik
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1525 - 1527To Secure Query Services in the Cloud with RASP Data Perturbation
Puja Bhaganagarkar, Dhanshree Kulkarni